- hash random file
- файл з довільною організацією
English-Ukrainian dictionary of microelectronics. 2013.
English-Ukrainian dictionary of microelectronics. 2013.
File verification — is the process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing two files bit by bit, but requires two copies of the same file, and may miss systematic corruptions which might… … Wikipedia
Hash table — Not to be confused with Hash list or Hash tree. Unordered map redirects here. For the proposed C++ class, see unordered map (C++). Hash Table Type unsorted dictionary Invented 1953 Time complexity in big O notation Average Worst case Space … Wikipedia
Hash function — A hash function is any well defined procedure or mathematical function for turning some kind of data into a relatively small integer, that may serve as an index into an array. The values returned by a hash function are called hash values, hash… … Wikipedia
Hash tree — A binary hash tree In cryptography and computer science Hash trees or Merkle trees are a type of data structure[citation needed] which contains a tree of summary information about a larger piece of da … Wikipedia
Hash buster — A hash buster is a program which randomly adds characters to data in order for the data s hash sum to be different than if the characters were not added.This is typically used to add words to spam e mails, in order to bypass hash filters. As the… … Wikipedia
File system fragmentation — In computing, file system fragmentation, sometimes called file system aging, is the inability of a file system to lay out related data sequentially (contiguously), an inherent phenomenon in storage backed file systems that allow in place… … Wikipedia
Simple file verification — (SFV) is a file format for storing CRC32 checksums of files in order to verify the integrity of files. SFV can be used to detect random corruptions in a file, but cannot be used for checking authenticity in any meaningful way. Typically, the .sfv … Wikipedia
Privacy in file sharing networks — File sharing peer to peer (P2P) systems like Gnutella, KaZaA, and eDonkey/eMule, took the Internet by a storm in recent years, with estimated user population of millions. Measurements show that about 50% of the file exchanges are illegal copies… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Distributed hash table — A distributed hash table (DHT) is a class of a decentralized distributed system that provides a lookup service similar to a hash table; (key, value) pairs are stored in a DHT, and any participating node can efficiently retrieve the value… … Wikipedia
ZIP (file format) — unzip redirects here. For the program, see Info ZIP. ZIP Filename extension .zip .zipx (newer compression algorithms) Internet media type application/zip Uniform Type Identifier com.pkware.zip archive Magic … Wikipedia